in ,

Uptick in Crypto mining malware in Q1 2021

Mining viruses more than quadrupled in March 2020 compared to the previous month.

Cryptomining malware is rapidly evolving, and today it is much more sophisticated and harmful than in the past.

It's not only a threat to computers but also smartphones, tablets, and IoT devices. Cryptomining viruses can also make their way onto computers through file-sharing programs, email attachments, and malicious websites.

The number of new modified variants of mining viruses more than quadrupled in March 2020 compared to the previous month.

Mining viruses are malicious programs designed to steal cryptocurrency from infected devices. These programs are often installed on the device without the user's knowledge bypassing firewall and antivirus protection.

According to Kasperky's “Malware Q1 2021” report, this trend increased in the first quarter of 2021. This report reveals that, between February and March 2021, the number of unique modifications of mining viruses more than quadrupled.

The report also highlights several other noteworthy trends, including a decrease in the number of infections by banking Trojans and an increase in the number of modified versions of ransomware.

So what is the best way to reduce the risk of exposure to mining viruses?

-Install a comprehensive up to date security solution that will keep your computer safe.

-Keep your computer OS and all your application up to date. Install all security updates and soon as they become available.

-Mining viruses are often categorized as “riskware,” which is not always malicious by nature, and security solutions do not automatically block them. So make sure to change your settings and don't let questionable apps be installed on your computer.

-Always use official sources when you download and install an app. Always use the latest, up-to-date version.

What do you think?

Written by Staff

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

twitter on the screen of a black smartphone in a mans hand

Hackers managed to manipulate Twitter’s algorithm for years.